File _patchinfo of Package patchinfo.29132

<patchinfo incident="29132">
  <issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
  <issue tracker="bnc" id="1211433">VUL-0: CVE-2022-42336: xen: Mishandling of guest SSBD selection on AMD hardware (XSA-431)</issue>
  <issue tracker="bnc" id="1208736">GCC 13: xen package fails</issue>
  <issue tracker="bnc" id="1210315">VUL-0: CVE-2022-42335: xen: x86 shadow paging arbitrary pointer dereference (XSA-430)</issue>
  <issue tracker="bnc" id="1209245">Xen VM fails to be destroyed (or crashes completely?) if Linux kernel in HVM guest records a crash with configured crashkernel+kdump</issue>
  <issue tracker="bnc" id="1210570">gcc-13 realloc use-after-free analysis error</issue>
  <issue tracker="bnc" id="1209237">xen-syms doesn't contain debug-info</issue>
  <issue tracker="cve" id="2022-42335"/>
  <issue tracker="cve" id="2022-42336"/>
  <packager>charlesa</packager>
  <rating>important</rating>
  <category>security</category>
  <reboot_needed/>
  <summary>Security update for xen</summary>
  <description>This update for xen fixes the following issues:

Security fixes:

- CVE-2022-42336: Fix an issue where guests configuring AMD
  Speculative Store Bypass Disable would have no effect (XSA-431)
  (bsc#1211433).
- CVE-2022-42335: Fixed an issue where guests running under shadow
  mode with a PCI devices passed through could force the hypervisor
  to dereference arbitrary memory, leading to a denial of service
  (XSA-430) (bsc#1210315).

Non-security fixes:

- Fixed a build warning false positive (bsc#1210570).
- Added missing debug-info to xen-syms (bsc#1209237).
- Updated to version 4.17.1 (bsc#1027519).
- Fixed a failure during VM destruction when using host-assisted kexec
  and kdump (bsc#1209245).
- Other upstream fixes (bsc#1027519).
</description>
</patchinfo>
openSUSE Build Service is sponsored by